ditis Systeme

ditis Systeme

Speciality: IT and OT Infrastructure Penetration Testing

11 employees
[01] About

Germany-based cybersecurity firm headquartered in Heidenheim, offering penetration testing, risk assessment, system security, and staff training services; established presence in the German market with a focus on trust and continuous system availability.

Germany-based cybersecurity firm headquartered in Heidenheim, offering penetration testing, risk assessment, system security, and staff training services; established presence in the German market with a focus on trust and continuous system availability.
[02] Services
Provides Penetration Testing
Risk Assessment
System Security
Staff Training
Managed Cybersecurity Services
Digital Product Security
AI Security
Information Security Compliance
Data Governance
Phishing Campaign Training
Red/blue Teaming Assessment
Industry-specific Cybersecurity Solutions.
[03] Certifications
ISO 27001

ISO 27001: Information Security Management Certification


Origin


ISO 27001 was developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), and was first published in 2005. It evolved from the British Standard BS 7799-2, which was created in the late 1990s. The standard was developed in response to the growing need for organizations to systematically manage and protect sensitive information in an increasingly digital business environment. ISO 27001 has since been revised, with major updates released in 2013 and 2022 to address evolving cybersecurity threats and best practices.


Industry Value and Importance


ISO 27001 is globally recognized as the leading standard for information security management systems (ISMS) and is valued for providing a systematic, risk-based approach to protecting sensitive data. Organizations that achieve ISO 27001 certification demonstrate to clients, partners, and regulators that they have implemented comprehensive security controls and are committed to maintaining confidentiality, integrity, and availability of information. The certification is particularly important for organizations handling sensitive data, as it helps meet regulatory compliance requirements, reduces security incidents, builds customer trust, and often provides a competitive advantage in procurement processes where information security assurance is required.

ISO 9001

ISO 9001 and Cybersecurity/IT


Origin


ISO 9001 is a quality management system standard developed by the International Organization for Standardization (ISO), first published in 1987. However, it's important to note that ISO 9001 itself is not a cybersecurity or IT-specific certification—it's a general quality management standard applicable to any industry. For cybersecurity and IT specifically, ISO created ISO/IEC 27001 in 2005, which focuses on information security management systems. ISO 9001 was created to establish consistent quality management practices across organizations worldwide, while ISO/IEC 27001 was developed to address the growing need for standardized information security controls.


Industry Value


ISO 9001 is valued across industries for demonstrating an organization's commitment to quality, customer satisfaction, and continuous improvement, which can indirectly support IT operations. For actual cybersecurity and IT security certification, ISO/IEC 27001 is the recognized standard, valued because it provides a systematic approach to managing sensitive information, demonstrates due diligence to clients and stakeholders, and is often required for government contracts or business partnerships. ISO/IEC 27001 certification signals that an organization has implemented internationally recognized security controls and risk management processes, making it essential for building trust in an increasingly security-conscious business environment.

Certified Cloud Security Professional (ccsp)
Offensive Security Certified Professional (oscp)

Offensive Security Certified Professional (OSCP)


Origin


The OSCP certification was created by Offensive Security, a cybersecurity training company founded in 2007 by Mati Aharoni, HD Moore, and other security professionals. The certification was developed to address the gap between theoretical security knowledge and practical penetration testing skills. Unlike traditional multiple-choice exams, OSCP requires candidates to complete a grueling 24-hour hands-on penetration testing examination where they must successfully compromise multiple machines in a controlled network environment to demonstrate real-world hacking capabilities.


Industry Value


The OSCP is highly valued in the cybersecurity industry because it proves practical, hands-on expertise rather than just theoretical knowledge. Employers recognize OSCP holders as professionals who can actually perform penetration testing tasks, not just pass written exams. The certification's "Try Harder" philosophy and demanding practical exam have earned it a reputation as one of the most challenging and respected entry-to-intermediate level certifications in offensive security. Many organizations, including government agencies and Fortune 500 companies, specifically seek OSCP-certified professionals for penetration testing and red team positions, often listing it as a preferred or required qualification in job postings.

Certified Red Team Operator (crto)
Certified Red Team Lead (crtl)
ISO/IEC 27001 Lead Auditor (irca)
Certified Information Systems Auditor (cisa)

Origin of CISA


The Certified Information Systems Auditor (CISA) certification was created by ISACA (Information Systems Audit and Control Association) in 1978. ISACA, founded in 1969, developed CISA to establish a standard for professionals working in IT audit, control, and security. The certification emerged in response to the growing need for qualified individuals who could audit information systems and ensure their proper governance, as organizations increasingly relied on computer systems for critical business operations.


Industry Value and Importance


CISA is widely recognized as one of the premier certifications for IT audit and control professionals. It demonstrates an individual's expertise in assessing vulnerabilities, implementing controls, and ensuring compliance with industry standards and regulations. Employers value CISA holders because the certification requires significant professional experience and passing a comprehensive exam covering domains like information system auditing, governance, and risk management. Many organizations, particularly in financial services, healthcare, and government sectors, specifically seek or require CISA certification for audit and compliance roles, making it a valuable credential for career advancement in IT governance and security.

Certified Information Security Manager (cism)

Certified Information Security Manager (CISM)


Origin


The Certified Information Security Manager (CISM) certification was created by ISACA (Information Systems Audit and Control Association) in 2003. ISACA developed CISM to address the growing need for a credential specifically focused on information security management rather than technical security skills alone. The certification was designed to recognize professionals who design, manage, and oversee an enterprise's information security program, filling a gap between technical security certifications and the business-focused leadership roles that were becoming increasingly critical in organizations.


Industry Value


CISM is highly valued in the cybersecurity industry because it validates expertise in information security governance, risk management, incident management, and program development from a management perspective. The certification is particularly respected for senior-level and managerial positions, as it demonstrates an individual's ability to align security strategies with business goals and manage security programs effectively. Many organizations, especially in regulated industries and government sectors, specifically seek CISM-certified professionals for leadership roles, and the credential is often associated with higher salaries and advancement opportunities in information security management careers.

Certified In Risk And Information System Control (crisc)
Certified Data Privacy Solutions Engineer (cdpse)
Teletrust Information Security Professional (t.i.s.p.)